To send content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about sending content to .
To send content items to your Kindle, first ensure email@example.com
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about sending to your Kindle.
Note you can select to send to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be sent to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
As the world becomes increasingly connected, it is also more exposed to a myriad of cyber threats. We need to use multiple types of tools and techniques to learn and understand the evolving threat landscape. Data is a common thread linking various types of devices and end users. Analyzing data across different segments of cybersecurity domains, particularly data generated during cyber-attacks, can help us understand threats better, prevent future cyber-attacks, and provide insights into the evolving cyber threat landscape. This book takes a data oriented approach to studying cyber threats, showing in depth how traditional methods such as anomaly detection can be extended using data analytics and also applies data analytics to non-traditional views of cybersecurity, such as multi domain analysis, time series and spatial data analysis, and human-centered cybersecurity.
News headlines about privacy invasions, discrimination, and biases discovered in the platforms of big technology companies are commonplace today, and big tech's reluctance to disclose how they operate counteracts ideals of transparency, openness, and accountability. This book is for computer science students and researchers who want to study big tech's corporate surveillance from an experimental, empirical, or quantitative point of view and thereby contribute to holding big tech accountable. As a comprehensive technical resource, it guides readers through the corporate surveillance landscape and describes in detail how corporate surveillance works, how it can be studied experimentally, and what existing studies have found. It provides a thorough foundation in the necessary research methods and tools, and introduces the current research landscape along with a wide range of open issues and challenges. The book also explains how to consider ethical issues and how to turn research results into real-world change.
Using easy-to-follow mathematics, this textbook provides comprehensive coverage of block codes and techniques for reliable communications and data storage. It covers major code designs and constructions from geometric, algebraic, and graph-theoretic points of view, decoding algorithms, error control additive white Gaussian noise (AWGN) and erasure, and dataless recovery. It simplifies a highly mathematical subject to a level that can be understood and applied with a minimum background in mathematics, provides step-by-step explanation of all covered topics, both fundamental and advanced, and includes plenty of practical illustrative examples to assist understanding. Numerous homework problems are included to strengthen student comprehension of new and abstract concepts, and a solutions manual is available online for instructors. Modern developments, including polar codes, are also covered. An essential textbook for senior undergraduates and graduates taking introductory coding courses, students taking advanced full-year graduate coding courses, and professionals working on coding for communications and data storage.
Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication of these threat actors can help reduce the risk of attacks. This book shifts attention from the defender environment to the attacker environment, offering a new security paradigm of 'proactive cyber threat intelligence' that allows defenders of computer networks to gain a better understanding of their adversaries by analyzing assets, capabilities, and interest of malicious hackers. The authors propose models, techniques, and frameworks based on threat intelligence mined from the heart of the underground cyber world: the malicious hacker communities. They provide insights into the hackers themselves and the groups they form dynamically in the act of exchanging ideas and techniques, buying or selling malware, and exploits. The book covers both methodology - a hybridization of machine learning, artificial intelligence, and social network analysis methods - and the resulting conclusions, detailing how a deep understanding of malicious hacker communities can be the key to designing better attack prediction systems.
This is the first book to study how the political content of information literacy (IL) arises from the way it has become defined and is taught. It introduces new methods for research into the development of information literacy in learners, and explores the implications of this research for the design of IL teaching, both in formal educational settings and in workplaces. Power is not an inherently dominating thing, wielded only from 'the top' (governments, senior managers in organisations, etc.) and used to oppress. The idea that information literacy education can be empowering , giving those at 'the bottom' the power to investigate information practices and change them if necessary, is supported by the models of power emerging from the work of Michel Foucault. He sees power as being available, potentially, to all actors and agents in a given setting. This is view of power as something emerging from, and shaping, micro-level discourses, and which can generate capital, helping learners change their world and the practices that shape it. To understand how such an approach can be empowering, the book explores how we can draw on difference in productive ways in IL education with a theory-led, empirical investigation of how the way information literacy is taught - whether formally or informally, and whether in schools, universities or workplaces - influences the development of information practices at the micro-level. The book also draws on original research to provide a detailed account of how information practices emerge from communities of learners in different settings and how discursive mapping can be taught to learners. It also covers how the capacity to engage in it emerges from educational environments in a more indirect way, and how learners respond to and resist institutionalised power by developing their own capacity to stewarding their information landscapes and digital habitats. Information literacy educators, whether in libraries, other HE courses, high schools or the workplace, will benefit by learning about how mapping - implicitly and explicitly - can be used as a method of teaching IL. Also, how they can design learning environments that exploit the positive value
We live in times of transparency. Digital technologies expose everything we do, like, and search for, and it is difficult to remain private and out of sight. Meanwhile, many people are concerned about the unchecked powers of tech giants and the hidden operations of big data, artificial intelligence and algorithms and call for more openness and insight. How do we - as individuals, companies and societies - deal with these technological and social transformations? Seen through the prism of digital technologies and data, our lives take new shapes and we are forced to manage our visibilities carefully. This book challenges common ways of thinking about transparency, and argues that the management of visibilities is a crucial, but overlooked force that influences how people live, how organizations work, and how societies and politics operate in a digital, datafied world.
What does it mean to digitize a medieval manuscript? This book examines this question by exploring a range of advanced imaging technologies. The author focuses on the relationship between digital technologies and the complex materiality of manuscripts and the human bodies that engage them. The chapters explore imaging technologies, interfaces to present digital surrogates, and limitations to and enhancements through the digital, plus historical photographs. Essential reading for all those involved in manuscript digitization projects in both scholarly and cultural heritage contexts.
Discover the very latest game-theoretic approaches for designing, modeling, and optimizing emerging wireless communication networks and systems with this unique text. Providing a unified and comprehensive treatment throughout, it explains basic concepts and theories for designing novel distributed wireless networking mechanisms, describes emerging game-theoretic tools from an engineering perspective, and provides an extensive overview of recent applications. A wealth of new tools is covered - including matching theory and games with bounded rationality - and tutorial chapters show how to use these tools to solve current and future wireless networking problems in areas such as 5G networks, network virtualization, software defined networks, cloud computing, the Internet of Things, context-aware networks, green communications, and security. This is an ideal resource for telecommunications engineers, and researchers in industry and academia who are working on the design of efficient, scalable, and robust communication protocols for future wireless networks, as well as graduate students in these fields.
This book explores medieval cityscapes within the modern urban environment, using place as a catalyst to forge connections between past and present, and investigating timely questions concerning theoretical approaches to medieval urban heritage, as well as the presentation and interpretation of that heritage for public audiences. Written by a specialist in literary and cultural history with substantial experience of multi-disciplinary research into medieval towns, 'Medieval Cityscapes Today' teases out stories and strata of meaning from the urban landscape, bringing techniques of close reading to the material fabric of the city, as well as textual artefacts associated with it.
Written by leading researchers, this complete introduction brings together all the theory and tools needed for building robust machine learning in adversarial environments. Discover how machine learning systems can adapt when an adversary actively poisons data to manipulate statistical inference, learn the latest practical techniques for investigating system security and performing robust data analysis, and gain insight into new approaches for designing effective countermeasures against the latest wave of cyber-attacks. Privacy-preserving mechanisms and the near-optimal evasion of classifiers are discussed in detail, and in-depth case studies on email spam and network security highlight successful attacks on traditional machine learning algorithms. Providing a thorough overview of the current state of the art in the field, and possible future directions, this groundbreaking work is essential reading for researchers, practitioners and students in computer security and machine learning, and those wanting to learn about the next stage of the cybersecurity arms race.
Literary archives differ from most other types of archival papers in that their locations are more diverse and difficult to predict. The essays collected in this book derive from the recent work of the Diasporic Literary Archives Network, whose focus on diaspora provides a philosophical framework which gives a highly original set of points of reference for the study of literary archives, including concepts such as the natural home, the appropriate location, exile, dissidence, fugitive existence, cultural hegemony, patrimony, heritage, and economic migration.
Learn about an information-theoretic approach to managing interference in future generation wireless networks. Focusing on cooperative schemes motivated by Coordinated Multi-Point (CoMP) technology, the book develops a robust theoretical framework for interference management that uses recent advancements in backhaul design, and practical pre-coding schemes based on local cooperation, to deliver the increased speed and reliability promised by interference alignment. Gain insight into how simple, zero-forcing pre-coding schemes are optimal in locally connected interference networks, and discover how significant rate gains can be obtained by making cell association decisions and allocating backhaul resources based on centralized (cloud) processing and knowledge of network topology. Providing a link between information-theoretic analyses and interference management schemes that are easy to implement, this is an invaluable resource for researchers, graduate students and practicing engineers in wireless communications.
In this unique collection the authors present a wide range of interdisciplinary methods to study, document, and conserve material cultural heritage. The methods used serve as exemplars of best practice with a wide variety of cultural heritage objects having been recorded, examined, and visualised. The objects range in date, scale, materials, and state of preservation and so pose different research questions and challenges for digitization, conservation, and ontological representation of knowledge. Heritage science and specialist digital technologies are presented in a way approachable to non-scientists, while a separate technical section provides details of methods and techniques, alongside examples of notable applications of spatial and spectral documentation of material cultural heritage, with selected literature and identification of future research. This book is an outcome of interdisciplinary research and debates conducted by the participants of the COST Action TD1201, Colour and Space in Cultural Heritage, 2012–16 and is an Open Access publication available under a CC BY-NC-ND licence.
This unique text helps make sense of big data in engineering applications using tools and techniques from signal processing. It presents fundamental signal processing theories and software implementations, reviews current research trends and challenges, and describes the techniques used for analysis, design and optimization. Readers will learn about key theoretical issues such as data modelling and representation, scalable and low-complexity information processing and optimization, tensor and sublinear algorithms, and deep learning and software architecture, and their application to a wide range of engineering scenarios. Applications discussed in detail include wireless networking, smart grid systems, and sensor networks and cloud computing. This is the ideal text for researchers and practising engineers wanting to solve practical problems involving large amounts of data, and for students looking to grasp the fundamentals of big data analytics.
Written in an easy-to-follow, tutorial style, this complete guide will allow students to quickly understand the key principles, techniques and applications of MIMO wireless communications. Important concepts such as MIMO channel models, power allocation and channel capacity, space-time codes, MIMO detection and antenna selection are covered in detail, providing practical insights into the world of modern telecommunication systems. The most up-to-date techniques are explained, with examples including spatial modulation, MIMO-based cooperative communications, large-scale MIMO systems, massive MIMO and space-time block coded spatial modulation. Supported by numerous solved examples, review questions, MATLAB problems and lecture slides, and including all the necessary mathematical background, this is an ideal text for students taking graduate, single-semester courses in wireless communications.
The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results.
Written by leading experts, this self-contained text provides systematic coverage of LDPC codes and their construction techniques, unifying both algebraic- and graph-based approaches into a single theoretical framework (the superposition construction). An algebraic method for constructing protograph LDPC codes is described, and entirely new codes and techniques are presented. These include a new class of LDPC codes with doubly quasi-cyclic structure, as well as algebraic methods for constructing spatially and globally coupled LDPC codes. Authoritative, yet written using accessible language, this text is essential reading for electrical engineers, computer scientists and mathematicians working in communications and information theory.
Security has become the pre-eminent organising principle of modern life, inextricably bound up with capital accumulation and Empire. This is the first sociological treatise on the security-industrial complex, offering a general theory of security based on a critical engagement with the works of Marx and Foucault.
In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation (MPC) and secret sharing. In a secure MPC, each party possesses some private data, while secret sharing provides a way for one party to spread information on a secret such that all parties together hold full information, yet no single party has all the information. The authors present basic feasibility results from the last 30 years, generalizations to arbitrary access structures using linear secret sharing, some recent techniques for efficiency improvements, and a general treatment of the theory of secret sharing, focusing on asymptotic results with interesting applications related to MPC.
This book discusses the theoretical limits of information transfer in random wireless networks or ad hoc networks, where nodes are distributed uniformly in space and there is no centralised control. It provides a detailed analysis of the two relevant notions of capacity for random wireless networks – transmission capacity and throughput capacity. The book starts with the transmission capacity framework that is first presented for the single-hop model and later extended to the multi-hop model with retransmissions. Reusing some of the tools developed for analysis of transmission capacity, a few key long-standing questions about the performance analysis of cellular networks are also provided for the benefit of students. The discussion goes further into the concept of hierarchical co-operation that allows throughput capacity to scale linearly with the number of nodes. The author finally discusses the concept of hierarchical co-operation that allows throughput capacity to scale linearly with the number of nodes.